The Latest in IT Security

New Spam campaign on Twitter Leads to Rogue AV


Early today, Kaspersky Lab discovered a new ongoing spam campaign on Twitter. hundreds of compromised accounts are currently spamming malicious links, hosted on .TK and domains, leading to Rogue Anti Virus softwares.

Here is an analysis of the infection at a given time. Keep in mind that it is just a snapshot of the infection, and that the numbers are actually lower than reality.

The compromised accounts spammed up to 8 messages per second, with links redirecting users to the infamous BlackHole exploit kit.

Upon following such a link, users received an alert about malicious activities on their computer and the need to do a fast scan of their system files

Here is the above mentioned fast system scan:

At the end of the “scan”, they are invited to install a fake Anti Malware solutions. During our tests, several variants were pushed to the infected machines, which were the same threat using different names. Here is one of them:

Campaign Monitoring

Kaspersky Lab is still monitoring the campaign and here are a few statistics we would like to share.

We started monitoring the campaign for a little less than two hours where a total number of 453 compromised Twitter account where being used to spam malicious links. The campaign was divided in two. Links to .TK domains and links to


153 unique users were actively sending links to .TK domains, with a count of 20 unique domains used. We recorded 656 messages sent.


300 unique users were actively sending links to domains, with a count of 21 unique domains used. We recorded 758 messages sent.

At this point, the domains weren’t resolving anymore and the spamming slowed down until it stopped. The top domains was used in 95 Tweets.

Campaign Monitoring: Part 2

The campaign quickly restarted with only 3 unique .TK domains this time in a much more agressive way and is still ongoing.

The top domain from the first part of the campaign was present in 95 tweets only. Here is the number of Tweets we recorded for the new ones:

WI[redacted]K.TK       884
VI[redacted]DA.TK      890
RE[redacted]LOS.TK     929 

This time, we recorded a number of 317 unique users actively spamming the new domains. 87 users were new and not used in the first part of the campaign.(230 overlapping from the first part of the campaign).


Our analysis is just a snapshot at a given time, and is lower than reality. The campaign is still ongoing as we publish our analysis. From our small monitoring, we can say that:

The total number of unique Twitter account that were recorded is: 540

The total number of unique domains used: 44

The total number of recorded Tweets is: 4148

The malicious samples we gathered were already detected by Kaspersky Lab and our customers were protected since the start of the campaign. Threats detected as: Trojan-FakeAV.Win32.Agent.dqs and Trojan-FakeAV.Win32.Romeo.dv

Many thanks to my colleague Vicente Diaz for helping monitoring the Malicious Campaign.

Leave a reply



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments